Ring networks use the ________ method to avoid data collisions.

A. packet screening
B. active-check
C. token
D. passive-check


Answer: C

Computer Science & Information Technology

You might also like to view...

Design or modify the Access form for the DELETE SOFTWARE EXPERT display. Which fields are drop-down lists? Use the repository data structure called DELETE SOFTWARE EXPERT.

What will be an ideal response?

Computer Science & Information Technology

If you wanted to show changes over a period of time, you would use a line chart or a(n) ________ chart

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can manually adjust a page break by pointing to the page break line and waiting for the four-headed arrow to appear, then drag the page break to your desired location

Indicate whether the statement is true or false

Computer Science & Information Technology

Two servers and five workstations are connected using a 100BASET network. Which of the following physical topologies is used?

A. FDDI B. Bus C. Ring D. Star

Computer Science & Information Technology